3.0 Architectures and Designs Flashcards

(63 cards)

1
Q

The use of multiple layers of security to protect resources. Controlled Diversity and Vendor Diversity are two methods organizations implement to provide this.

A

Defense-in-Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The practice of implementing security controls from different vendors to increase security.

A

Vendor Diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of different security control types such as technical controls, administrative controls, and physical controls.

A

Control Diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security controls implemented via administrative or management methods.

A

Administrative Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security controls implemented through technology.

A

Technical Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network architecture that is situated between an untrusted network and a protected network and acts as a protective buffer zone between the two networks.

A

DMZ (Demilitarized Zone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The part of an internal network shared with outside entities. They are often used to provide access to authorized business partners, customers, vendors, or others.

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An internal network. People use this to communicate and share content with each other.

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A service that translates public IP address to private IP address and vice versa.

A

NAT (Network Access Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A connection mode used by wireless devices without an access point. When wireless devices connect through an access point they are using infrastructure mode.

A

AD HOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A method of segmenting traffic, it logically groups several different computers together without regard of their physical location.

A

VLAN (Virtual Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technology that allows you to host multiple virtual machines on a single physical system.

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A physical security control that provides physical isolation. Systems separated by this don’t typically have any physical connections to other systems.

A

Airgap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A dedicated device used for VPNs that includes all the services needs to create a VPN, including strong encryption and authentication techniques.

A

VPN Concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Devices used to handle TLS traffic. Servers can offload TLS traffic to improve performance.

A

SSL Acelerator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware of software that balances the load between two or more servers.

A

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An attack on a system launched from multiple sources, intended to make a computers resources or services unavailable to users.

A

DDoS (Distributive Denial of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A method to encrypt an entire disc.

A

FDE (Full Disc Encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A drive that includes the hardware and software necessary to encrypt a hard drive.

A

SED (Self Encrypting Drive)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hardware chip on a motherboard included in many laptops and some mobile devices.

A

TPM (Trusted Platform Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A removable or external device that can generate, store, and manage RSA keys using asymmetric encryption.

A

HSM (Hardware Security Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A method used to boot some systems and intended to replace BIOS firmware.

A

UEFI/BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Interference caused by motors, power lines, and fluorescent lights.

A

EMI/EMP (Electromagnetic Interference/ Pulse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A freestanding device that operates in a largely self-contained manner.

A

Appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A core principle of secure system design. Systems should be deployed with only the services, application, and protocols needed to meet their purpose.
Least Functionality
26
A list of applications that a system allows.
Application White Listing
27
A list of applications that a system denies.
Application Black Listing
28
The use of an isolated area on a system, typically for testing.
Sandboxing
29
The state of a system when all required OS software and applications as well as configuration details have been configured exactly according to predetermined standard.
Baselining
30
A system used to control an ICS such as a power plant or a water treatment facility.
SCADA (Supervisory Control and Data Acquisition)
31
The network of physical devices connected to the Internet.
IoT (Internet of Things)
32
Physical security control that increase availability by regulating air flow within data centers and server rooms.
HVAC
33
An integrated circuit that includes a computing systems within the hardware. Many mobile devices include this.
SoC (System on a Chip)
34
An operating system that reacts to input within a specific time.
RTOS (Real Time Operating System)
35
Software development cycle using a top down approach. It uses multiple stage; with each stage starting after the previous stage is completed.
Waterfall Method
36
The process of managing and provisioning computer datacenters through machine-readable definition files.
Infrastructure as Code
37
The process of organizing data and columns in a database.
Normalization
38
An attempt to make something unclear or difficult to understand.
Obfuscation
39
A method of testing that intentionally enters invalid input to see if the application can handle it.
Fuzzing
40
Subjecting a system to workloads that are extreme.
Stress Testing
41
Virtualization method that is independent of the operating system and boots before the OS.
Type I Hypervisor
42
Virtualization method that is dependent on the operating system.
Type II Hypervisor
43
A model of cloud computing in which the consumer can use the provider's applications, but they do not manage or control any of the underlying cloud infrastructure.
SaaS
44
A cloud service model wherein the consumer can deploy but does not manage or control any of the underlying cloud infrastructure.
PaaS
45
A model of cloud computing that utilizes virtualization; clients pay an outsourcer for the resources used.
IaaS
46
A cloud delivery model owned and managed internally.
Private Cloud
47
A cloud delivery model available to others.
Public Cloud
48
Any cloud delivery model that combines two or more of the other delivery model types.
Hybrid Cloud
49
Cloud delivery model in which the infrastructure is shared by organizations with something in common.
Community Cloud
50
A subscription-based business model intended to be more cost effective than smaller individuals/corporations could ever achieve on their own.
Security as a Service
51
Image of a virtual machine at a moment in time.
Snapshot
52
A method to bring a system back quickly to its pre-attack state without needing a fixed set of hardware, OS, or configuration.
Non-persistence
53
The capability to support future network growth beyond its current needs.
Scalability
54
To have more than one of something, or some functioning feature of a system, or even another complete system.
Redundancy
55
The capability of any system to continue functioning after some part of the system has failed. RAID is an example.
Fault Tolerance
56
A configuration of multiple hard disks used to provide fault tolerance should a disk fail. Different levels of RAID exist.
RAID
57
A device, such as a small room, that limits access to one or a few individuals. They typically use electronic locks and other methods to control access.
Mantrap
58
An electrically conductive wire mesh or other conductor woven into a "cage" that surrounds a room and prevents electromagnetic signals from entering or leaving the room through the walls.
Faraday Cage
59
Human physical characteristics that can be measured and saved to be compared as authentication and granting the user access to a network or resource.
Biometrics
60
An authentication device or file.
Token
61
A physical security deterrent used to protect a computer.
Cable Lock
62
The management of all aspects of cryptographic keys in a cryptosystem, including key generation, exchange, storage, use, destruction and replacement.
Key Management
63
A method of software development meant to be rapid.
Agile Development